Command Line Option Vulnerability in Python's Webbrowser API
CVE-2026-4519
7HIGH
What is CVE-2026-4519?
The webbrowser.open() API within Python has a vulnerability that allows URL inputs with leading dashes to be processed as command line options by certain web browsers. This issue can lead to unintended command execution. Although recent updates reject such inputs, it is recommended that users sanitize URLs thoroughly before passing them to the API to mitigate this risk. Developers should ensure that leading dashes are removed from URLs to maintain the integrity and security of their applications.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
CPython 0 < 3.15.0
References
CVSS V4
Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Seth Larson
Gregory P. Smith
